CVE-2024-22421 – notebook
Package
Manager: pip
Name: notebook
Vulnerable Version: >=7.0.0 <7.0.7
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00138 pctl0.34463
Details
JupyterLab vulnerable to potential authentication and CSRF tokens leak ### Impact Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version. ### Patches JupyterLab 4.1.0b2, 4.0.11, and 3.6.7 were patched. ### Workarounds No workaround has been identified, however users should ensure to upgrade `jupyter-server` to version 2.7.2 or newer which includes a redirect vulnerability fix. ### References Vulnerability reported by user @davwwwx via the [bug bounty program](https://app.intigriti.com/programs/jupyter/jupyter/detail) [sponsored by the European Commission](https://commission.europa.eu/news/european-commissions-open-source-programme-office-starts-bug-bounties-2022-01-19_en) and hosted on the [Intigriti platform](https://www.intigriti.com/).
Metadata
Created: 2024-01-19T20:28:10Z
Modified: 2024-01-22T20:57:53Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/01/GHSA-44cc-43rp-5947/GHSA-44cc-43rp-5947.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-44cc-43rp-5947
Finding: F017
Auto approve: 1